This type of file contains data that has not been converted to text.a. text fileb. binary filec. Unicode filed. symbolic file

Answers

Answer 1

The binary file contains data that has not been converted to text The correct answer is (b) binary file.

Binary files contain data that has not been converted to text, and they typically consist of sequences of 0s and 1s that are interpreted by a computer program as specific types of data. Examples of binary files include executable programs, images, audio and video files, and data files that contain machine-readable information such as databases and spreadsheets.

In contrast, text files contain human-readable characters that have been encoded using a specific character set, such as ASCII or Unicode. Unicode is a character encoding standard that supports a wide range of languages and character sets, and it is commonly used for text files that need to be compatible with multiple platforms and languages. Symbolic files, on the other hand, are a type of file that contains references to other files or directories, and they are commonly used in Unix-based operating systems.

Option B is the answer.

You can learn more about binary file at

https://brainly.com/question/27319612

#SPJ11


Related Questions

100% pl…View the full answer
answer image blur
Transcribed image text: Convert the following Pseudo-code to actual coding in any of your preferred programming Language (C/C++/Java will be preferable from my side!) Declare variables named as i, j, r, c, VAL Print "Enter the value ofr: " Input a positive integer from the terminal and set it as the value of r Print "Enter the value of c: " Input a positive integer from the terminal and set it as the value of c Declare a 2D matrix named as CM using 2D array such that its dimension will be r x c Input an integer number (>0) for each cell of CM from terminal and store it into the 2D array Print the whole 2D matrix CM Set VAL to CM[0][0] Set both i and j to 0 While i doesn't get equal to r minus 1 OR j doesn't get equal to c minus 1 Print "(i, j) →" // i means the value of i and j means the value of j If i is less than r minus 1 and j is less than c minus 1 If CM[i][j+1] is less than or equal to CM[i+1][j], then increment j by 1 only Else increment i by 1 only Else if i equals to r minus 1, then increment j by 1 only Else increment i by 1 only Print "(i, j)" // i means the value of i and j means the value of j Increment VAL by CM[i][j] Print a newline Print the last updated value of VAL The above Pseudo-code gives solution to of one of the well-known problems we have discussed in this course. Can you guess which problem it is? Also, can you say to which approach the above Pseudo-code does indicate? Is it Dynamic Programming or Greedy? Justify your answer with proper short explanation.

Answers

The following is the solution to the provided Pseudo code in C++ programming language. As for which problem this Pseudo code gives a solution for, it is the problem of finding the path with minimum weight in a matrix from its top-left corner to its bottom-right corner, known as the Minimum Path Sum problem.The above Pseudo code shows the Greedy approach of solving the Minimum Path Sum problem. This is because at each cell of the matrix, it always picks the minimum of the right and down cell and moves there, instead of keeping track of all paths and comparing them, which would be the Dynamic Programming approach. Hence, it does not require to store all the sub-problem solutions in a table but instead makes a decision by selecting the locally optimal solution available at each stage. Therefore, we can conclude that the above Pseudo code does indicate the Greedy approach to the Minimum Path Sum problem in computer programming.Explanation:After receiving input of the dimensions of the matrix and the matrix itself, the Pseudo code declares a variable VAL and initializes it with the first cell value of the matrix. It then uses a while loop to iterate through the matrix till it reaches its bottom-right corner. At each cell, it checks if it can only move to the right or down, and then it moves in the direction of the minimum value. VAL is then updated by adding the value of the current cell to it.After the loop is exited, the last updated value of VAL is printed, which is the minimum path sum value.

Learn more about Pseudo code here:

https://brainly.com/question/21319366

#SPJ11

When creating a new pivot table tyle, in the format cell dialog box, which tab change the ize and hape of the text?

Answers

When creating a new pivot table style and using the format cells dialogue box, the "Font" tab is used to change the size and shape of the text.

In the Font tab, you can adjust the following properties of the text:

Font: the typeface used for the textFont style: bold, italic, underline, strikethroughSize: the size of the textColor: the color of the textEffects: options such as shadow, outline, and small caps

By using the Font tab, you can quickly change the appearance of the text in your pivot table, such as making the text larger or smaller, bolding or italicizing it, or changing its color.

This can be useful for emphasizing important data or making the pivot table easier to read. It's worth noting that, depending on the software you are using, the options in the format Cell dialogue box may be different, but the Font tab is usually present to change the text formatting.

To learn more about Font tab, use the link:

brainly.com/question/15787410

#SPJ4

Sketch the following directions and planes within the cubic cell (for your convenience, the attached sheet with unit cells can be used for your drawing): [110]; [121]; [3];01]; (111); (3; (3); 1) Make certain that all directions and planes are drawn within the cubic cell given. What kind of relationship exist between a direction [uvw] and plane (hkl), if u=h,v=k,w=l ?

Answers

Parallel relationship between direction [uvw] and plane (hkl) if u=h, v=k, w=l.

What is the process of converting a decimal number to binary using repeated division by 2?

In crystallography, a direction [uvw] represents a set of parallel lines within a crystal lattice, while a plane (hkl) represents a set of lattice planes.

The relationship between a direction and a plane is based on their respective normal vectors.

If the components of the direction vector [uvw] are equal to the indices of the plane normal vector (hkl), such as u=h, v=k, and w=l, it indicates that the direction vector is parallel to the plane normal vector.

This parallel relationship suggests that the direction and plane are closely aligned and have a special connection within the crystal structure.

Learn more about Parallel relationship

brainly.com/question/16686523

#SPJ11

having a legitimate reason for approaching someone to ask for sensitive information is called what?

Answers

It’s called Impersonation

solve the following problem. it may be helpful to draw a chart on scrap paper to organize the information and write the equation. be sure to show all steps (v.e.s.t.) and work in order to receive full credit. a clerk was asked to change a $10 bill. she returned 9 more dimes than nickels and twenty-one more quarters than dimes. how many coins of each did she return?

Answers

A clerk was asked to change a $10 bill. The clerk returned -20/3 nickels, 7 dimes, and 28 quarters.

What do you mean by bill?

A bill is a document that states a specific amount of money that a person owes for goods or services. It may also refer to a legislative document that proposes a law that must be agreed upon by both houses of a legislature before it can become law.

This problem can be solved using the V.E.S.T. approach:

Variables:

N = number of nickels

D = number of dimes

Q = number of quarters

Equation:

N + D + Q = 150

Given Conditions:

D = 9 + N

Q = 21 + D

Substituting the second condition into the first:

N + (9 + N) + (21 + 9 + N) = 150

Simplifying and solving for N:

3N + 30 = 150

3N = 120

N = 40

Substituting the value of N into the second condition:

D = 9 + 40

D = 49

Substituting the values of N and D into the third condition:

Q = 21 + 49

Q = 70

Therefore, the clerk returned 40 nickels, 49 dimes, and 70 quarters.

To learn more about bills refer to:

https://brainly.com/question/30289874

#SPJ4

what is direction flow on network and security devices

Answers

The direction flow on network and security devices refers to the direction in which data or traffic is directed or passed through these devices. Generally, traffic flows in two directions: ingress, meaning data entering the device, and egress, meaning data leaving the device. Network and security devices use this direction flow to help ensure that data is kept secure.

For example, a firewall can be configured to allow data to flow in one direction only, such as ingress only, or egress only. This can help protect the network from malicious traffic.

Learn more about network: https://brainly.com/question/8118353

#SPJ11

What will you see on the next line? >>> int(6.5)

Answers

Answer:

6

Explanation:

The int functions founds down to the nearest whole number, which in this case would be 6.

Answer:

6

Explanation:

How does HTTP rely on the other layers of the Internet?

Answers

HTTP is commonly used on web browser and being on top of transport layer

HELLLP PLEASEEEEEEEEE

HELLLP PLEASEEEEEEEEE

Answers

Answer:

torque

a twisting or turning force.

Hope it will help :)

Write a program that accepts the lengths of three sides of a triangle as inputs. the program output should indicate whether or not the triangle is a right triangle. recall from the pythagorean theorem that in a right triangle, the square of one side equals the sum of the squares of the other two sides. use the triangle is a right triangle. and the triangle is not a right triangle. as your final outputs.

Answers

The code will have to obey the Pythagorean theorem that says square of the hypotenuse side is equals to the sum of the squares of the other legs.

How to write a code that check if a triangle is a right angle by using Pythagoras theorem?

The code is written in python.

def right_triangle(x, y, z):

    if x**2 + y**2 == z**2 or y**2 + z**2 == x**2 or z**2 + x**2 == y**2:

         print("it is a right angle triangle")

    else:

         print("it is not a right angle triangle")

right_triangle(6, 10, 8)

Code explanationwe defined as function named "right_triangle". x, y and z are argument which are the length of the triangle.Then we check if the sides obeys Pythagoras theorem.If it does we print a positive statement else we print a negative statement.

Learn more about python at: https://brainly.com/question/21437082

#SPJ4

Write a program that accepts the lengths of three sides of a triangle as inputs. the program output should

A student is creating an application that allows customers to order food for delivery from a local restaurant. Which of the following is LEAST likely to be an input provided by a customer using the application?

A) The address where the order should be delivered

B) The cost of a food item currently available for order

C) The credit card or payment information for the purchaser

D) The name of a food item to be included in the delivery

Answers

The least likely input provided by a customer using the application would be:

B) The cost of a food item currently available for order.

When customers use a food delivery application, they typically rely on the app to provide them with the cost information of the food items. The application already has access to the restaurant's menu and pricing, so customers don't need to input the cost themselves. Instead, they can browse the available options and select the items they wish to order. Therefore, it is highly unlikely that customers would need to manually input the cost of a food item when using the application.

Learn more about food delivery application:

brainly.com/question/15170520

#SPJ11

Create a State Diagram for ATM system. There are 5 states in the system.

Answers

The State Diagram for an ATM system consists of 5 states representing different stages of the system's operation.

The State Diagram for an ATM system typically includes five states: Idle, Card Inserted, PIN Entered, Transaction Selection, and Transaction Processing.

Idle: This is the initial state of the system when no card has been inserted. The ATM waits for a card to be inserted by the user.

Card Inserted: After the user inserts a card, the system transitions to the Card Inserted state. Here, the ATM verifies the card and prompts the user to enter their PIN.

PIN Entered: Once the user enters their PIN, the system moves to the PIN Entered state. The ATM validates the PIN and allows the user to select a transaction.

Transaction Selection: In this state, the user selects the desired transaction, such as cash withdrawal, balance inquiry, or fund transfer. The ATM prompts the user for additional details if required.

Transaction Processing: After the user selects a transaction, the system transitions to the Transaction Processing state. The ATM processes the transaction, performs the necessary operations, and updates the account balance. Once the transaction is completed, the system returns to the Idle state.

The State Diagram provides a visual representation of the different states and the transitions between them in an ATM system, illustrating the flow of user interactions and system operations.

Learn more about PIN here:

https://brainly.com/question/14615774

#SPJ11

Write an input command using the variable company_name.

Answers

Answer:

company_name = input("What if your company name?");

print("I hope " + company_name + "becomes successful!");

Explanation:

The input of the user becomes a variable which is then stored in order to print it out as a message.

Software is glving Instructions so that text is displayed on the monitor. This software is an example of
application software
programming software
system software
programming language

Answers

Answer:

System software

Explanation:

Because it shows what you have typed into the computer

Answer:

programming software

Explanation:

because programming software well show in text what you need to do

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

What type of validation is more important from a security perspective for a web application?

Answers

From a security perspective, input validation is more important for a web application.

Input validation is a critical security measure that ensures the integrity and safety of data submitted to a web application. It involves validating and sanitizing user inputs to prevent malicious or unexpected data from causing security vulnerabilities or compromising the application.

By implementing robust input validation, a web application can prevent various security threats, including:

1. Injection attacks: Proper validation can prevent attacks such as SQL injection or command injection, where malicious code is injected into input fields to manipulate or compromise the underlying system.

2. Cross-Site Scripting (XSS): Input validation helps detect and block malicious scripts or code injected into user inputs, thereby mitigating the risk of XSS attacks that can lead to unauthorized access, session hijacking, or data theft.

3. Cross-Site Request Forgery (CSRF): Validating and verifying user inputs helps protect against CSRF attacks, where malicious websites or attackers trick users into performing unintended actions on authenticated websites.

4. Data tampering: Input validation ensures that the data submitted by users is within the expected range or format, preventing data tampering or manipulation that could lead to unauthorized access or unintended system behavior.

While output validation and other security measures are also important, input validation is particularly crucial as it acts as the first line of defense against many common security vulnerabilities.

From a security perspective, input validation is more important for a web application. It plays a vital role in preventing common security threats such as injection attacks, XSS, CSRF, and data tampering. Implementing strong input validation mechanisms helps ensure the integrity and safety of user-submitted data, reducing the risk of security breaches and protecting the overall security posture of the web application.

To know more about web application, visit

https://brainly.com/question/28302966

#SPJ11

What statement best describes operating systems?
It’s possible for modern computers to function without operating systems.
Most operating systems are free or very inexpensive.
Operating systems are managed by the computer’s microprocessor (CPU).
Operating systems manage the computer’s random access memory (RAM).

Answers

The statement which best describes operating systems is: D. Operating systems manage the computer’s random access memory (RAM).

What is an operating system?

An operating system (OS) can be defined as a system software that is pre-installed on a computing device to manage random access memory (RAM), software applications, computer hardware and user processes.

This ultimately implies that, an operating system (OS) acts as an interface (intermediary) between an end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions, including the management of the random access memory (RAM).

Read more on software here: https://brainly.com/question/26324021

Answer:

Answer is D! :)

Explanation:

A _____ begins with a simple moving average of a predetermined number of bars and then, using those results, takes a moving average of a length of half the original number of bars. a. wilder moving average b. geometric moving average c. triangular moving average d. weighted moving average

Answers

Triangular moving average

Which type of moving average begins with a simple moving average of a predetermined number of bars and then takes a moving average of a length equal to half the original number of bars?

A triangular moving average is a type of moving average that starts with a simple moving average of a predetermined number of bars and then calculates a moving average of a length equal to half the original number of bars using those results.

It places more weight on the recent data points compared to the earlier ones, creating a smoother and lag-reduced moving average.

The triangular moving average is commonly used in technical analysis to identify trends and support/resistance levels in financial markets.

Learn more about   Triangular moving

brainly.com/question/27109472

#SPJ11

SOx legislation requires that management designs the computer
system to be available for all.
True
False
Question 6
10 Points
the decision planning types are Blank 1, Blank 2, Blank 3

Answers

The decision planning types are an essential part of organizational decision-making. Those are Blank 1: strategic, Blank 2: tactical, and Blank 3: operational.

The decision planning types are strategic, tactical, and operational. These three types of decisions represent different levels of an organization and correspond to different timeframes and scopes.

1. Strategic decisions: Strategic decisions are made by top-level management and focus on long-term goals and overall direction. These decisions are crucial for the organization's success and involve allocating resources, setting objectives, and determining the overall strategy. Strategic decisions are typically made by executives and involve a broader perspective.

2. Tactical decisions: Tactical decisions are made by middle-level management and are more focused on implementing the strategic decisions. They involve short to medium-term planning and are aimed at achieving specific objectives and targets. Tactical decisions often deal with resource allocation, coordination between departments, and operational planning.

3. Operational decisions: Operational decisions are made by lower-level management and employees who are directly involved in day-to-day operations. These decisions are routine in nature and focus on the specific tasks and activities required to carry out the tactical plans. Operational decisions are made frequently and are based on established procedures and guidelines.

By understanding and distinguishing between strategic, tactical, and operational decisions, organizations can effectively align their goals, resources, and actions at different levels within the hierarchy. This helps ensure coordinated and efficient decision-making processes that contribute to the overall success of the organization.

To know more about Tactical Decision, visit

https://brainly.com/question/28986071

#SPJ11

information is retrieved from a network model through a process of __________.

Answers

The process of retrieving information from a network model is called inference.

Inference is the process of using a trained network model to make predictions or generate outputs based on input data. During inference, the network model takes in input data and performs calculations to generate the desired output.

The calculations performed during inference are based on the parameters and weights learned by the network model during the training phase. These parameters represent the learned knowledge of the model and are used to transform the input data into meaningful predictions or outputs.

The specific calculations involved in inference depend on the type of network model being used. For example, in a neural network, inference typically involves matrix multiplications, non-linear activation functions, and other mathematical operations to process the input data through the network's layers.

Inference is the crucial process of retrieving information from a network model. It utilizes the trained parameters and weights to transform input data into predictions or outputs. This process is essential for using the knowledge encoded in the network model to make informed decisions, solve problems, or generate desired outputs in various applications, such as image recognition, natural language processing, and recommendation systems.

To know more about Inference, visit

https://brainly.com/question/31325030

#SPJ11

Fill in the blank: Sticker sheets are useful in a design system because _____.
designers can work faster and avoid rework

Answers

Answer:

Sticker sheets are useful in a design system because they enable designers to quickly and easily copy and paste components into new designs, reducing the amount of time needed to create designs and avoiding the need for rework.

Explanation:

They enable designers to produce reusable visual components that are consistent with the brand, enhancing user experience all around.

Technical definition sheet: What is it?

A technical data file (TDS) is just a document that comes with a product and contains a variety of details about the item. Technical data sheets frequently feature information about the product's composition, usage guidelines, technical specifications, typical applications, cautions, and product images.

What does the word "sheets" mean?

Paper each is typically rectangular in appearance. especially: equipment specifically engineered for printing. (2) : a mounted plant specimen on a relatively thin, rectangular sheet of paper. a 100,000 sheet important to the advancement.

To know more about Sheets visit :

https://brainly.com/question/30277396

#SPJ4

To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
do first is
get on her computer to search the topic
make a list of the books she could use.
ask her teacher for specific suggestions.
make a list of relevant sources to check out

Answers

Answer:

The correct option is D)  

Explanation:

To get information about a research topic the first thing to do is make a list of relevant sources.

Georgias sources would depend on the type of research she has been asked to conduct.

If it's primary research, she would collect information from:

Her own experienceHer own observationthe Information she gathers personally from other people

If it is  secondary research, she can look at

books (hard copy, e-copy)journals (online, offline)online (blogs, videos, websites etc)

Whilst looking online, it is important to stick to authoritative sources as it is possible for anyone to publish anything online.

Examples of reliable sources are:

Journals from Industry AssociationsBureaus of StatisticsGlobal Research CompaniesHigher Institutions e.t.c.

Cheers!

Answer:

D

Explanation:

Edge 2021

What
ICT H/W
ст
are the Function numbering
•MS word
and bullets

Answers

The function of Bullets and numbering in MS Word is that Bulleted and numbered lists are known to be tool that often help a person to be able to simplify steps or items to any given reader readers.

People do make use of bulleted lists to be able to highlight some key pieces of their lessons.

What is numbering in MS Word?

It is one that is often called the ordered list, number format, as well as the number list.

Note that the  Bulleted and numbered lists are said to be tool that is often used in a given documents to put together and format text so as to be able to draw emphasis.

Hence, The function of Bullets and numbering in MS Word is that Bulleted and numbered lists are known to be tool that often help a person to be able to simplify steps or items to any given reader readers.

Learn more about numbering   from

https://brainly.com/question/4509295

#SPJ1

describe the third generation of computers​

Answers

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry.

The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.

Third Generation

The main features of third generation are −

IC used

More reliable in comparison to previous two generations

Smaller size

Generated less heat

Faster

Lesser maintenance

Costly

AC required

Consumed lesser electricity

Supported high-level language

Some computers of this generation were −

IBM-360 series

Honeywell-6000 series

PDP (Personal Data Processor)

IBM-370/168

TDC-316

television advertising was influenced by the rapid-cut editing style of mtv in the _______.

Answers

Television advertising was indeed influenced by the rapid-cut editing style of MTV in the 1980s.

This style of editing, also known as "fast cutting," involved quickly transitioning between shots and creating a sense of frenetic energy and urgency. This style was popularized by MTV music videos, which were known for their fast-paced, visually dynamic editing. Advertisers quickly recognized the appeal of this editing style and began incorporating it into their commercials. The goal was to capture the attention of viewers and create a sense of excitement and urgency around their products or services.

This trend continued into the 1990s and beyond, as advertisers continued to experiment with different editing techniques and styles to create impactful, memorable commercials. Ultimately, the influence of MTV on television advertising helped to shape the way we consume and respond to advertising messages in the modern era.

Learn more about Television advertising: https://brainly.com/question/25556823

#SPJ11

Python question 4.2: Question 2

Python question 4.2: Question 2

Answers

Answer:

n=1

while True:  

   i=input("What pet do you have? ")

   if i=="rock":

       break

   else:

       print("You have a " + i + " with a total of " + str(n) + " pet(s)")

       n=n+1

you client wants a wireless access point with greater scalability than the one the isp has provided. best practice would be to disable the wireless and routing capabilities of the isp modem/router. what mode would we setup the isp modem router to? this question is beyond the scope of the lab but a very important one. do a little research if necessary to get this right, you will use this knowledge in the future

Answers

The wireless access point can then be connected to the modem/router through the LAN ports, allowing it to provide wireless connectivity throughout the home or office. This is the best practice for setting up an ISP modem/router when a client requires a wireless access point with greater scalability than the one provided by the ISP.

In order to provide greater scalability to a client who requires a wireless access point, it is recommended to disable the wireless and routing capabilities of the ISP modem/router. In order to accomplish this, it is necessary to set the ISP modem/router to bridge mode. Bridge mode is a network configuration that allows a device to work as a bridge, which helps in forwarding traffic between two networks. When a modem is in bridge mode, the modem is configured to pass-through the traffic directly to the connected device in order to enable them to carry out their tasks. This information can be useful in the future, particularly when setting up a network or troubleshooting issues related to network connectivity.

Learn more about Internet Service Provider : https://brainly.com/question/28342757

#SPJ11

Define bit, nibble, byte, binary

Answers

Answer: , a group of 4 bits is called a nibble

Explanation:

x = int(input("Enter a number: ")) print (x)) What happens if the user types in A?

Answers

Answer: The "what happens if the user types in A" is not in quotations;

Explanation: The correct code would be x = int(input("Enter a number")) print" "x" What happens if a user types in A?" Assuming the language is python

Answer:

If the user types in "A" as an input, the program will raise a ValueError exception, because the input "A" is not a valid integer. The int() function is used to convert a string representation of a number to an integer, and it raises a ValueError if the input string cannot be converted to an integer.

The error message will be: "invalid literal for int() with base 10: 'A'"

And the program will stop executing. To avoid this, you can use try-except block to catch the exception and handle it by providing a proper error message or any other action you want to take.

for what work photoshop is used?

Answers

its for making commercials and background that look cool
Adobe Photoshop is a software used for editing photographs, compositing digital art, animating, and graphic design
Other Questions
Use nonnegative edge weights and construct a 4-vertex edged-weighted graph in which the maximum-weight matching is not a maximum-cardinality matching. Note: The cardinality is referred to the size of a set General guidelines for carrying a patient on a stretcher include:A. slightly twisting your body when carrying.B. constant communication with your partners.C. leaning back from your waist when lifting.D. maintaining slight flexion of your back. Which two factors of ocean water would have the highest density?warm water and high salt contentwarm water and low salt contentcold water and high salt contentcold water and low salt content A solid rectangular right prism is 12 inches long, 6 inches high, and 6 inches deep. At one square base of the prism, a 3 inch high square pyramid is cut from the prism. At the opposite square base of the prism, a square pyramid measuring 4 inches high is added. The bases of the pyramids are the same size as the square bases of the rectangular prism. What is the volume of the composite figure? DHD has been shown to often coexist with each of the following EXCEPTA) learning disabilities.B) emotional or behavioral disorders.C) giftedness.D) substance abuse. When a company allocates the use of specific resources throughout the firm based on a financial plan indicating management's expectations, then the company is using a(n) as the basis for making decisions. the hypotenuse of a right triangle is 50ft it is acceptableto divide by Zero o True o false. it was during the tenure of chief justice that the supreme court established gender discrimination as a highly visible area of civil rights law. There are different models that business organizations can select to organize their operations, and market their products or services.Question: discuss the existing debate about the best way to run a commercial business (family firms VS. corporations) Divergent plate boundaries are when platescollidemove past each othermove apart ideally, how will the rubber duck (representing individual water particles in a wave) in the image move in comparison to the propagation of a series of waves moving toward the right? Both a price taker and a price maker maximize profits (or minimize losses) by producing the quantity of output at which __________ equals __________. Sometimes, people are to serve in the military.A determinedB requiredC warnedD reminded how does an increase in temperature(kinetic energy) affect a substance in terms of shape and volume? complete the statement address all parts of the question. as the temperature of a substance increases... question 1 options: shape becomes indefinite and volume increases shape becomes more definite and volume increases shape becomes indefinite and volume decreases shape becomes more definite and volume decreases An air conditioner runs 15 minutes each hour on a hot summer day. It is on a 240 volt circuit and uses 21 amps. Rate is $.10/kWhHow much does it cost to run for one day? Round to the nearest cent. $Answer only answer if you know the right answer please Which stream drainage pattern would consist of a central high elevation region with several streams draining away from it in all compass directions A storm isa. dome of water that sweeps across the coast where a hurricane lands._ b. Huge body of air that has similar temperature, humidity, and air pressure at any given height.c. Boundary where air masses meet and cold air rises above warm air.d. Violent disturbance in the atmosphereBRAINLIEST SAR ns: Writing stions /*- een pro How did Luguno felt before She arrives at the new School?